AES power attack based on induced cache miss and countermeasure

G Bertoni, V Zaccaria, L Breveglieri… - … Computing (ITCC'05 …, 2005 - ieeexplore.ieee.org
This paper presents a new attack against a software implementation of the Advanced
Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus …

Skin and bones: Multi-layer, locally affine, optical flow and regularization with transparency

SX Ju, MJ Black, AD Jepson - Proceedings CVPR IEEE …, 1996 - ieeexplore.ieee.org
This paper describes a new method for estimating optical flow that strikes a balance
between the flexibility of local dense computations and the robustness and accuracy of …

Determining the feasibility of forearm mounted vibrotactile displays

I Oakley, Y Kim, J Lee, J Ryu - 2006 14th symposium on haptic …, 2006 - ieeexplore.ieee.org
At first glance, multi-element forearm mounted vibrotactile displays would appear to have
considerable potential as an output device for mobile computing. The devices are small …

Exploiting cloud and workflow patterns for the analysis of composite cloud services

F Amato, F Moscato - Future Generation Computer Systems, 2017 - Elsevier
The rapid increase in heterogeneity, scale and diversity of cloud resources and services
leads to a growing-up complexity in their management and control. The development of new …

Pattern-based orchestration and automatic verification of composite cloud services

F Amato, F Moscato - Computers & Electrical Engineering, 2016 - Elsevier
Recent years have seen an increase of complexity in paradigms and languages for
development of Cloud Systems. The need to build value added services and resources …

Improving security in cloud by formal modeling of IaaS resources

F Amato, F Moscato, V Moscato, F Colace - Future Generation Computer …, 2018 - Elsevier
Nowadays, it is a matter of fact that Cloud is a “must” for all complex services requiring great
amount of resources. Big-Data Services are a striking example: they actually perform many …

Authenticating IoT devices with physically unclonable functions models

M Barbareschi, P Bagnasco… - 2015 10th International …, 2015 - ieeexplore.ieee.org
Wirelessly connected smart embedded devices, forming the so called Internet of Things
network, have achieved unprecedented levels of diffusion as they are adopted in many …

Automatic design space exploration of approximate algorithms for big data applications

M Barbareschi, F Iannucci… - 2016 30th international …, 2016 - ieeexplore.ieee.org
Nowadays, Big Data represents a new era in data exploration, manipulation and utilization
as it requires an effective rethinking of platforms, computing paradigms, architectures and …

Executable workflows: a paradigm for collaborative design on the Internet

H Lavana, A Khetawat, F Brglez… - Proceedings of the 34th …, 1997 - dl.acm.org
This paper introduces a directed hypergraph modelthat supports (1) workflow composition
and reconfigurationwhile accessing and executing programs, data, and computingresources …

Model driven design and evaluation of security level in orchestrated cloud services

F Amato, N Mazzocca, F Moscato - Journal of Network and Computer …, 2018 - Elsevier
Cloud-based architectures, services and resources are growing up in complexity day by day.
Composition and Orchestration deal with the problem of creating complex services …